<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Logging on DevOpsTales</title>
    <link>https://devopstales.github.io/tags/logging/</link>
    <description>Recent content in Logging on DevOpsTales</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <lastBuildDate>Sun, 15 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://devopstales.github.io/tags/logging/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Send pfSense Logs to Wazuh</title>
      <link>https://devopstales.github.io/linux/wazuh-pfsense-syslog/</link>
      <pubDate>Sun, 15 Mar 2026 00:00:00 +0000</pubDate>
      
      <guid>https://devopstales.github.io/linux/wazuh-pfsense-syslog/</guid>
      <description>Centralizing pfSense firewall logs in Wazuh SIEM provides critical security visibility and threat detection capabilities. This updated guide for 2026 covers pfSense 2.7.x/2.8.x and Wazuh 4.8+ with proper syslog formatting and decoder configuration.
</description>
      <enclosure url="https://devopstales.github.io//img/wazuh.webp" length="3636" type="image/png" />
    </item>
    
    <item>
      <title>Wazuh SIEM Authentication</title>
      <link>https://devopstales.github.io/linux/wazuh-authentication/</link>
      <pubDate>Tue, 05 Sep 2023 00:00:00 +0000</pubDate>
      
      <guid>https://devopstales.github.io/linux/wazuh-authentication/</guid>
      <description>In this post I will show you how to configure LDAP Authentication in a Wazuh Open Source SIEM solution.
</description>
      <enclosure url="https://devopstales.github.io//img/wazuh.webp" length="3636" type="image/png" />
    </item>
    
    <item>
      <title>Install Wazuh SIEM</title>
      <link>https://devopstales.github.io/linux/wazuh-siem/</link>
      <pubDate>Fri, 01 Sep 2023 00:00:00 +0000</pubDate>
      
      <guid>https://devopstales.github.io/linux/wazuh-siem/</guid>
      <description>In this post I will show you how to install and configure the Wazuh Open Source SIEM solution.
</description>
      <enclosure url="https://devopstales.github.io//img/wazuh.webp" length="3636" type="image/png" />
    </item>
    
    <item>
      <title>Analyzing PFsense logs in Graylog5</title>
      <link>https://devopstales.github.io/linux/graylog5-pfsense/</link>
      <pubDate>Tue, 20 Dec 2022 00:00:00 +0000</pubDate>
      
      <guid>https://devopstales.github.io/linux/graylog5-pfsense/</guid>
      <description>We will parse the log records generated by the PfSense Firewall. We already have our graylog server running and we will start preparing the terrain to capture those logs records.
</description>
      <enclosure url="https://devopstales.github.io/img/graylog.webp" length="8172" type="image/png" />
    </item>
    
    <item>
      <title>Install Graylog5</title>
      <link>https://devopstales.github.io/linux/graylog5-install/</link>
      <pubDate>Mon, 19 Dec 2022 00:00:00 +0000</pubDate>
      
      <guid>https://devopstales.github.io/linux/graylog5-install/</guid>
      <description>Graylog is defined in terms of log management platform for collecting, indexing, and analyzing both structured and unstructured data from almost any source.
</description>
      <enclosure url="https://devopstales.github.io/img/graylog.webp" length="8172" type="image/png" />
    </item>
    
    <item>
      <title>Sending syslog via Kafka into Graylog</title>
      <link>https://devopstales.github.io/linux/graylog_kafka/</link>
      <pubDate>Sat, 20 Mar 2021 00:00:00 +0000</pubDate>
      
      <guid>https://devopstales.github.io/linux/graylog_kafka/</guid>
      <description>Graylog supports Apache Kafka as a transport for various inputs such as GELF, syslog, and Raw/Plaintext inputs. The Kafka topic can be filtered by a regular expression and depending on the input, various additional settings can be configured.
</description>
      <enclosure url="https://devopstales.github.io/img/graylog.webp" length="8172" type="image/png" />
    </item>
    
    <item>
      <title>Analyzing PFsense logs in Graylog4</title>
      <link>https://devopstales.github.io/linux/graylog4-pfsense/</link>
      <pubDate>Mon, 15 Mar 2021 00:00:00 +0000</pubDate>
      
      <guid>https://devopstales.github.io/linux/graylog4-pfsense/</guid>
      <description>We will parse the log records generated by the PfSense Firewall. We already have our graylog server running and we will start preparing the terrain to capture those logs records.
</description>
      <enclosure url="https://devopstales.github.io/img/graylog.webp" length="8172" type="image/png" />
    </item>
    
    <item>
      <title>Install Graylog4</title>
      <link>https://devopstales.github.io/linux/graylog4-install/</link>
      <pubDate>Sun, 14 Mar 2021 00:00:00 +0000</pubDate>
      
      <guid>https://devopstales.github.io/linux/graylog4-install/</guid>
      <description>Graylog is defined in terms of log management platform for collecting, indexing, and analyzing both structured and unstructured data from almost any source.
</description>
      <enclosure url="https://devopstales.github.io/img/graylog.webp" length="8172" type="image/png" />
    </item>
    
    <item>
      <title>Analyzing PFsense squid logs in Graylog</title>
      <link>https://devopstales.github.io/linux/graylog-pfsense-squid/</link>
      <pubDate>Sun, 24 Nov 2019 00:00:00 +0000</pubDate>
      
      <guid>https://devopstales.github.io/linux/graylog-pfsense-squid/</guid>
      <description>We will parse the access log records generated by PfSense and squid plugin. We already have our graylog server running and we will start preparing the terrain to capture those logs records.
</description>
      <enclosure url="https://devopstales.github.io/img/graylog.webp" length="8172" type="image/png" />
    </item>
    
    <item>
      <title>Analyzing PFsense logs in Graylog3</title>
      <link>https://devopstales.github.io/linux/graylog3-pfsense/</link>
      <pubDate>Thu, 04 Jul 2019 00:00:00 +0000</pubDate>
      
      <guid>https://devopstales.github.io/linux/graylog3-pfsense/</guid>
      <description>We will parse the log records generated by the PfSense Firewall. We already have our graylog server running and we will start preparing the terrain to capture those logs records.
</description>
      <enclosure url="https://devopstales.github.io/img/graylog.webp" length="8172" type="image/png" />
    </item>
    
    <item>
      <title>Install Graylog3</title>
      <link>https://devopstales.github.io/linux/graylog3-install/</link>
      <pubDate>Mon, 24 Jun 2019 00:00:00 +0000</pubDate>
      
      <guid>https://devopstales.github.io/linux/graylog3-install/</guid>
      <description>Graylog is defined in terms of log management platform for collecting, indexing, and analyzing both structured and unstructured data from almost any source.
</description>
      <enclosure url="https://devopstales.github.io/img/graylog.webp" length="8172" type="image/png" />
    </item>
    
    <item>
      <title>Grafana Loki</title>
      <link>https://devopstales.github.io/monitoring/grafana-loki/</link>
      <pubDate>Sat, 22 Jun 2019 00:00:00 +0000</pubDate>
      
      <guid>https://devopstales.github.io/monitoring/grafana-loki/</guid>
      <description>Loki is a Prometheus-inspired logging service for cloud native infrastructure. It’s similar to well-known ELK stack but more simple use and is intended to be used mostly Kubernetes.
</description>
      <enclosure url="https://devopstales.github.io/img/loki.webp" length="6030" type="image/png" />
    </item>
    
  </channel>
</rss>
